How to Install and Uninstall libsodium.x86_64 Package on Amazon Linux 2
Last updated: February 05,2025
1. Install "libsodium.x86_64" package
Please follow the steps below to install libsodium.x86_64 on Amazon Linux 2
$
sudo yum makecache
Copied
$
sudo yum install
libsodium.x86_64
Copied
2. Uninstall "libsodium.x86_64" package
Please follow the guidance below to uninstall libsodium.x86_64 on Amazon Linux 2:
$
sudo yum remove
libsodium.x86_64
Copied
$
sudo yum autoremove
Copied
3. Information about the libsodium.x86_64 package on Amazon Linux 2
Loaded plugins: ovl, priorities
Available Packages
Name : libsodium
Arch : x86_64
Version : 1.0.18
Release : 2.amzn2
Size : 156 k
Repo : amzn2extra-php7.4/2/x86_64
Summary : The Sodium crypto library
URL : http://libsodium.org/
License : ISC
Description : Sodium is a new, easy-to-use software library for encryption,
: decryption, signatures, password hashing and more. It is a
: portable, cross-compilable, installable, packageable fork of NaCl,
: with a compatible API, and an extended API to improve usability
: even further. Its goal is to provide all of the core operations
: needed to build higher-level cryptographic tools. The design
: choices emphasize security, and "magic constants" have clear
: rationales.
:
: The same cannot be said of NIST curves, where the specific origins
: of certain constants are not described by the standards. And
: despite the emphasis on higher security, primitives are faster
: across-the-board than most implementations of the NIST standards.
Available Packages
Name : libsodium
Arch : x86_64
Version : 1.0.18
Release : 2.amzn2
Size : 156 k
Repo : amzn2extra-php7.4/2/x86_64
Summary : The Sodium crypto library
URL : http://libsodium.org/
License : ISC
Description : Sodium is a new, easy-to-use software library for encryption,
: decryption, signatures, password hashing and more. It is a
: portable, cross-compilable, installable, packageable fork of NaCl,
: with a compatible API, and an extended API to improve usability
: even further. Its goal is to provide all of the core operations
: needed to build higher-level cryptographic tools. The design
: choices emphasize security, and "magic constants" have clear
: rationales.
:
: The same cannot be said of NIST curves, where the specific origins
: of certain constants are not described by the standards. And
: despite the emphasis on higher security, primitives are faster
: across-the-board than most implementations of the NIST standards.